decent equipment
Should I use a standard video editor? Windows movie maker
When a large amount of diverse video material is accumulated on the computer of an ordinary user, a definite desire arises (especially given the existence of the Internet and many social networks in it) to share it with as many people as possible.
Home video material such as filming holidays, hiking and other events is calmly laid out on the same YouTube video hosting, some more special shootings can be used to create a variety of video reviews, video blogs and similar Internet hobbies. In any case, the video material that should be posted on the Web often needs some work – if not color correction, then at least cropping unsuccessful fragments. Special programs for such work are video editors (video editors). Continue reading
What is the Morris Worm?
In early November 1988, the first ever network attack on computers connected to the global network took place. Her culprit was Cornell University graduate student Robert Tappan Morris.
The program, written by Robert Morris, had a small dictionary of the most well-known passwords, which provided it with penetration of 10 percent of computers connected to ARPANET. Once on a foreign computer, the program first checked whether the same program was already installed here. If the computer was still “clean”, the program masked its presence in the system, read a file that contained information about users of the “occupied” system, forwarded this information to the author, and then Continue reading
How to keep your computer healthy?
A computer is a universal tool that allows you to work, relax, chat, or shop. At the same time, even without visiting malicious sites, you cannot be sure of protecting your computer, as the search for vulnerabilities in the IT industry is always ahead of the development of protection. Thus, you should independently worry about the safety of your data with the help of an antivirus.
What is it and why is it necessary? The comfort of using a particular system is inversely related to security. This rule has some derogations, but in general terms it looks just like that. Therefore, no matter how comfortable it is to work, one must assume the possibility of hacking. Even by accessing regular pages and not clicking any unnecessary links, you can get malware onto your computer if the page you Continue reading